SlideShare a Scribd company logo
Contents
 Understanding Data & Information
 What is Information Security?
 What is Cryptography?
 RSA cryptosystem
Introduction
 Key generation Algorithm
Encryption & Decryption
Key Pair Generation Example
 Implementation
 Limitation
 Conclusion
 Reference
Understanding Data &
Information
What is Data?
 Data can be defined as a representation of facts, concepts
or instructions in a formalized manner, which should be
suitable for communication, interpretation or processing by
human or electronic machine.
What is Information?
 Information is organized or classified data so that it has
some meaningful values to the receiver.
 Information is the processed data on which decisions and
actions are based.
 For the decision to be meaningful, the processed data must
be accurate, complete and in time.
What is Information Security?
Information Security is simply the process of keeping
information secure, protecting its confidentiality
availability, integrity, and non-repudiation.
Information Security Goals
 Confidentiality - protecting information from being
disclosed to unauthorized parties.
 Integrity - protecting information from being changed by
unauthorized parties.
 Availability - to the availability of information to authorized
parties only when requested.
 Non-repudiation - to confirm that the data is not
abandoned
What is Cryptography?
 It is the art of protecting information by transforming it
(encrypting it) into an unreadable format, called cipher
text.
 Only those who possess a secret key can decipher (or
decrypt) the message into plain text.
 Cryptography systems can be broadly classified into
1. Symmetric Key System
Uses a single secret key to encrypt and decrypt
Ex-Data Encryption Standard(DES)
2. Asymmetric Key system
Uses a public key(known to everyone ) for encryption
and a private key(known to recipient) for decryption.
Ex-RSA, ECDSA (Elliptic Curve Digital Signature
Algorithm), DSA (the Digital Signature Algorithm)
RSA Cryptosystem
 RSA is an algorithm for public-key cryptography.
 RSA stands for Ron Rivest, Adi Shamir and Leonard
Adleman(the publishers of the algorithm)
 The RSA cryptosystem assumes that multiplying two
numbers is a simple process.
 But factoring the products back into the original two
numbers is quite difficult to do computationally.
 The difficulty increases as we use larger and larger
numbers.
Introduction
 The system works on a public and private key system. The
public key is made available to everyone.
 With this key a user can encrypt data but cannot decrypt it.
 The only person who can decrypt it is the one who
possesses the private key.
 It is theoretically extremely difficult to generate the private
key from the public key.
 This makes the RSA algorithm a very popular choice in data
encryption
Key Generation Algorithm
 Choose two large random prime integers:
Take p and q
 Compute n and φ(n):
n = pq and φ(n) = (p-1)(q-1)
 Choose an odd public exponent e, 1 < e < φ(n) such that:
gcd(e, φ(n)) = 1
 Compute the private exponent d, 1 < d < φ(n) such that:
ed ≡ 1 (mod φ(n))
Key Generation Algorithm
 The public key is (n, e) and the private key is (n, d)
 The values of p, q and φ(n) are private.
 e is the public or encryption exponent.
 d is the private or decryption exponent.
Encryption & Decryption
Encryption
 The encryption operation in the RSA cryptosystem is
exponentiation to the e th power modulo n:
c = ENCRYPT (m) = me mod n
 The input m is the message.
 The output c is the resulting cipher text.
Decryption
 The decryption operation is exponentiation to the d th
power modulo n:
 The message m can be found form the cipher text C by the
equation
m = DECRYPT (c) = Cd mod n
Key Pair Generation
Example
 Take Primes:
p = 5, q = 11
 Compute n:
n = pq = 55
 Compute φ(n):
φ(n) = (p-1)(q-1)=40
 Choose Public exponent e = 3:
Check gcd(3,40)=1
 Compute Private exponent d:
d = 1/3 mod 20 = 7
Message Encryption Decryption
M M2 mod n M3 mod n C2 mod n C6 mod n C7 mod n
0 0 0 0 0 0
1 1 1 1 1 1
2 4 8 9 14 2
3 9 27 14 49 3
4 16 9 26 31 4
5 25 15 5 15 5
6 36 51 16 26 6
7 39 13 4 9 7
8 9 17 14 49 8
9 26 14 31 36 9
Implementation
 This technique is widely being used on the
internet, military, government sites in addition to banks
and other financial institutions.
 Also it is being used for
Disk encryption
Safe transformation of E-mail
Authentication process
Electronic Commerce
Limitation of RSA
Though so far RSA has not been broken but certain
attention must be given in the following cases
 Not using small primes.
( because N could be easily factorised)
 Not using primes that are very close.
(root of N will reveal how close they are)
 Two people must not use the same N.
(if the two public exponents are co-prime, then the
message may be retrieved)
 Message should not be observable of e th power.
(if the value of e is very small, then it is easy to find m)
Conclusion
 It is one of the most heavily used asymmetric cryptographic
algorithms in the world make it the envy and the favorite of
many security professionals.
 While the mathematics behind the algorithm are simple
enough to be relatively easily understood, the complexity
of dealing with very large prime numbers and the factoring
of even larger numbers into those primes is what makes
this encryption standard so resilient.
Reference
 http://www.tutorialspoint.com/computer_fundamentals/c
omputer_data.htm
 http://www.infosec.gov.hk/english/information/what.html
 http://idrbtca.org.in/inf_crypto.htm
 http://www.webopedia.com/TERM/C/cryptography.html
 http://www.dwhenry.com/files/RSA.pdf
 http://www.mathaware.org/mam/06/Kaliski.pdf
Rsa Crptosystem

More Related Content

What's hot

Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Rsa
RsaRsa
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
swarnapatil
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
chauhankapil
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 

What's hot (20)

Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Rsa
RsaRsa
Rsa
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
DES
DESDES
DES
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 

Similar to Rsa Crptosystem

Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
Mohamed Ramadan
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Mohsin Ali
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
BhuvanaR13
 
Presentation
PresentationPresentation
Presentation
rokham khawaja
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
werip98386
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
Chanaka Lasantha
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
SM NAZMUS SALEHIN
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 

Similar to Rsa Crptosystem (20)

Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Presentation
PresentationPresentation
Presentation
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Encryption
EncryptionEncryption
Encryption
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Rsa Crptosystem

  • 1.
  • 2. Contents  Understanding Data & Information  What is Information Security?  What is Cryptography?  RSA cryptosystem Introduction  Key generation Algorithm Encryption & Decryption Key Pair Generation Example  Implementation  Limitation  Conclusion  Reference
  • 3. Understanding Data & Information What is Data?  Data can be defined as a representation of facts, concepts or instructions in a formalized manner, which should be suitable for communication, interpretation or processing by human or electronic machine. What is Information?  Information is organized or classified data so that it has some meaningful values to the receiver.  Information is the processed data on which decisions and actions are based.  For the decision to be meaningful, the processed data must be accurate, complete and in time.
  • 4. What is Information Security? Information Security is simply the process of keeping information secure, protecting its confidentiality availability, integrity, and non-repudiation. Information Security Goals  Confidentiality - protecting information from being disclosed to unauthorized parties.  Integrity - protecting information from being changed by unauthorized parties.  Availability - to the availability of information to authorized parties only when requested.  Non-repudiation - to confirm that the data is not abandoned
  • 5. What is Cryptography?  It is the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.  Only those who possess a secret key can decipher (or decrypt) the message into plain text.  Cryptography systems can be broadly classified into 1. Symmetric Key System Uses a single secret key to encrypt and decrypt Ex-Data Encryption Standard(DES) 2. Asymmetric Key system Uses a public key(known to everyone ) for encryption and a private key(known to recipient) for decryption. Ex-RSA, ECDSA (Elliptic Curve Digital Signature Algorithm), DSA (the Digital Signature Algorithm)
  • 6. RSA Cryptosystem  RSA is an algorithm for public-key cryptography.  RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman(the publishers of the algorithm)  The RSA cryptosystem assumes that multiplying two numbers is a simple process.  But factoring the products back into the original two numbers is quite difficult to do computationally.  The difficulty increases as we use larger and larger numbers.
  • 7. Introduction  The system works on a public and private key system. The public key is made available to everyone.  With this key a user can encrypt data but cannot decrypt it.  The only person who can decrypt it is the one who possesses the private key.  It is theoretically extremely difficult to generate the private key from the public key.  This makes the RSA algorithm a very popular choice in data encryption
  • 8. Key Generation Algorithm  Choose two large random prime integers: Take p and q  Compute n and φ(n): n = pq and φ(n) = (p-1)(q-1)  Choose an odd public exponent e, 1 < e < φ(n) such that: gcd(e, φ(n)) = 1  Compute the private exponent d, 1 < d < φ(n) such that: ed ≡ 1 (mod φ(n))
  • 9. Key Generation Algorithm  The public key is (n, e) and the private key is (n, d)  The values of p, q and φ(n) are private.  e is the public or encryption exponent.  d is the private or decryption exponent.
  • 10. Encryption & Decryption Encryption  The encryption operation in the RSA cryptosystem is exponentiation to the e th power modulo n: c = ENCRYPT (m) = me mod n  The input m is the message.  The output c is the resulting cipher text. Decryption  The decryption operation is exponentiation to the d th power modulo n:  The message m can be found form the cipher text C by the equation m = DECRYPT (c) = Cd mod n
  • 11. Key Pair Generation Example  Take Primes: p = 5, q = 11  Compute n: n = pq = 55  Compute φ(n): φ(n) = (p-1)(q-1)=40  Choose Public exponent e = 3: Check gcd(3,40)=1  Compute Private exponent d: d = 1/3 mod 20 = 7
  • 12. Message Encryption Decryption M M2 mod n M3 mod n C2 mod n C6 mod n C7 mod n 0 0 0 0 0 0 1 1 1 1 1 1 2 4 8 9 14 2 3 9 27 14 49 3 4 16 9 26 31 4 5 25 15 5 15 5 6 36 51 16 26 6 7 39 13 4 9 7 8 9 17 14 49 8 9 26 14 31 36 9
  • 13. Implementation  This technique is widely being used on the internet, military, government sites in addition to banks and other financial institutions.  Also it is being used for Disk encryption Safe transformation of E-mail Authentication process Electronic Commerce
  • 14. Limitation of RSA Though so far RSA has not been broken but certain attention must be given in the following cases  Not using small primes. ( because N could be easily factorised)  Not using primes that are very close. (root of N will reveal how close they are)  Two people must not use the same N. (if the two public exponents are co-prime, then the message may be retrieved)  Message should not be observable of e th power. (if the value of e is very small, then it is easy to find m)
  • 15. Conclusion  It is one of the most heavily used asymmetric cryptographic algorithms in the world make it the envy and the favorite of many security professionals.  While the mathematics behind the algorithm are simple enough to be relatively easily understood, the complexity of dealing with very large prime numbers and the factoring of even larger numbers into those primes is what makes this encryption standard so resilient.
  • 16. Reference  http://www.tutorialspoint.com/computer_fundamentals/c omputer_data.htm  http://www.infosec.gov.hk/english/information/what.html  http://idrbtca.org.in/inf_crypto.htm  http://www.webopedia.com/TERM/C/cryptography.html  http://www.dwhenry.com/files/RSA.pdf  http://www.mathaware.org/mam/06/Kaliski.pdf